Key Takeaways: We delve into the inherent strengths and common challenges that GPT (OpenAI’s GPT-4 henceforth “GPT”) encounters when engaged in the realm of malware analysis, providing tangible examples for clarity. Examining the root cause and structure of the ‘ceiling’…
Tag: Check Point Blog
Check Point Awarded Silver Stevie for Achievement in Developing and Promoting Women
We are proud to be awarded the 2023 Silver Stevie for Achievement in Developing and Promoting Women! At Check Point, we believe that a diverse workforce encourages a wider variety of skills, talents, and viewpoints, leading to further creativity and…
Check Point Honors U.S. Active Military and Veterans with Launch of Employee Resource Group (ERG)
Check Point is proud to unveil its new U.S. Active Military, Veterans, and Allies Employee Resource Group (ERG), a valuable resource for all US employees – veterans and non-veterans alike. This initiative signifies more than a corporate addition, as it…
Data Posture Management in Action: Meet the New Check Point CloudGuard
Traditionally, securing sensitive data begins with scanning your environment and classifying the data, allowing you to pinpoint where sensitive information resides. This audit process instills confidence by enabling you to establish policies to prevent data breaches. However, it is crucial…
Keeping Up with Today’s Top Mobile Spyware Threat Trends
You’re doing all you can to build a hardened cybersecurity fortress around your digital assets. But are you leaving a backdoor open to attackers without realizing it? Mobile devices are central to how we all work today, but they’re also…
A Hole in the (fire) Wall: Check Point Research reveals technique allowing attackers to bypass Firewall rules designed to stop NTLM credential thefts, and provides protection methods
Highlights: Check Point Research (CPR) reveals a technique abusing Microsoft Access’s feature (Part of the Office suite) that might allow attackers to bypass Firewall rules designed to stop NTLM (NetNTLM) credential theft. Attacks against NTLM vary between brute force attacks…
October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign
Check Point Research reported that NJRat climbed four places into second spot last month. Meanwhile a new mal-spam campaign was discovered involving AgentTesla, the sixth most used malware, being delivered via corrupted file attachments Our latest Global Threat Index for…
Elevating Cybersecurity Prevention: Check Point Software’s Innovative MSSP Program Redefines Security Collaboration
Simplified, Scalable, and Forward-Thinking Advancements for Managed Security Services Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has enhanced its MSSP Partner Program. This move addresses the critical workforce shortage in cybersecurity and…
Cloud Security in Action: Meet Check Point CloudGuard
Digital transformation and the widespread adoption of cloud technologies are creating mega-shifts across all industries. The adoption of cloud is far from straightforward and linear, as companies navigate their cloud adoption journey in phases. Moreover, the range of technologies employed…
Check Point Recognized on the 2023 CRN Edge Computing 100 List
Today, accelerated cloud adoption and hybrid work require security to expand beyond the traditional network perimeter, making edge security a paramount focus. CRN’s fourth-annual Edge Computing 100 list honors trailblazing vendors leading the channel with next-generation technology that helps build…
Getting to Know Zehra Hussain
Zehra Hussain is an Incident Response Analyst based in Sydney, Australia. Her role involves responding to security incidents and ensuring the protection of sensitive data and systems. With a background in digital forensics and satellite engineering, Zehra brings unique expertise…
“The Big Bully : Importance of detecting and preventing cyberbullying”
Check Point Software highlights the growth of cyberbullying among young people and the need to take measures to reduce it. In the United States, nearly 50% of teenagers between the ages of 13 and 17 had experienced cyberbullying. Our society…
Why OSS Packages Can’t Scale without New Security Measures
In the vibrant arena of software development, open-source software (OSS) has emerged as a vital catalyst for spurring innovation, nurturing collaboration, and boosting cost efficiency. OSS projects have seen explosive growth, with millions of dedicated developers contributing to a jaw-dropping…
Unraveling the Scarred Manticore Saga: A Riveting Epic of High-Stakes Espionage Unfolding in the Heart of the Middle East
Highlights: 1. Silent Intruders: Scarred Manticore, an Iranian cyber threat group linked to MOIS (Ministry of Intelligence & Security), is quietly running a stealthy sophisticated spying operation in the Middle East. Using their latest malware tools framework, LIONTAIL, they have…
Evolving Cyber Dynamics Amidst the Israel-Hamas Conflict
Highlights: Pro-Palestinian cyber activists have broadened their scope beyond Israel, targeting countries perceived as Israeli allies in the war against Hamas. The cyber operations mainly serve as informational and retaliatory tactics, with limited reported damage. Target selection is influenced by…
Securely Migrating to AWS with Check Point
The cloud has emerged as the primary infrastructure backbone for most enterprises, providing a scalable, flexible, reliable, and customizable platform for the delivery of mission-critical applications. As a result, it has become the leading foundation of server architecture for both…
Empowering Cybersecurity: A Generative AI Revolution
October is not just about falling leaves and pumpkin spice; it’s also Cybersecurity Awareness Month—a time to reflect on the ever-evolving landscape of digital threats and the innovative solutions that keep us protected. In this blog post, we’ll explore the…
Getting to Know: Kim Forsthuber
Kim Forsthuber is a Channel Specialist for at Check Point Software Technologies. As a Channel Specialist, Kim works closely with Check Point’s partners to develop and execute strategic marketing and sales plans for the Harmony portfolio. Prior to Check Point,…
The City of Kamloops Protects City Data and Networks with Check Point Software
Check Point Harmony Email & Collaboration successfully blocked over 14,000 phishing emails on Kamloops’ servers that evaded the previous email protection Business email compromise is a type of spear phishing attack in which cyber criminals use business tools to trick…
Check Point CloudGuard is now Microsoft Azure Consumption Commitment Eligible
Check Point CloudGuard, Check Point’s solution for Azure Virtual WAN security, is now eligible for Microsoft Azure consumption commitment (MACC). Azure customers with qualifying Azure agreements can now purchase CloudGuard and use it towards fulfilling their commitments while adding an…